warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP
shall not be liable for technical or editorial errors or omissions contained herein.
Confidential computer software. Valid license from HP required for possession, use or copying. Consistent with FAR 12.211 and 12.212,
Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S.
Government under vendor’s standard commercial license.
Intended audience
This document is for the person who installs, administers, and troubleshoots servers and storage systems. HP assumes you are qualified in the
servicing of computer equipment and trained in recognizing hazards in products with hazardous energy levels.
Contents
Accessing the command line interface............................................................................................. 9
Remote access to the Onboard Administrator................................................................................................ 9
Local access to the Onboard Administrator................................................................................................... 9
SET RACK NAME.................................................................................................................................... 18
SHOW RACK NAME ..............................................................................................................................18
SHOW TOPOLOGY................................................................................................................................ 18
User account commands.............................................................................................................. 20
ADD USER ............................................................................................................................................. 20
DISABLE USER ........................................................................................................................................21
REMOVE LDAP GROUP ...........................................................................................................................33
SET LDAP GROUP ACCESS...................................................................................................................... 34
SET LDAP GROUP DESCRIPTION ..............................................................................................................34
SET LDAP NAME MAP............................................................................................................................. 34
SET LDAP PORT....................................................................................................................................... 35
SET LDAP SEARCH .................................................................................................................................. 35
SET LDAP SERVER ................................................................................................................................... 35
SHOW LDAP CERTIFICATE....................................................................................................................... 35
SHOW LDAP GROUP.............................................................................................................................. 36
SHOW LDAP INFO ................................................................................................................................. 36
TEST LDAP.............................................................................................................................................. 37
UNASSIGN for LDAP............................................................................................................................... 37
UNASSIGN OA LDAP GROUP .................................................................................................................37
HP SIM commands...................................................................................................................... 39
SET DEVICE SERIAL_NUMBER BLADE ........................................................................................................44
SET FACTORY ........................................................................................................................................ 44
SET SCRIPT MODE .................................................................................................................................. 44
SHOW ALL ............................................................................................................................................ 45
SHOW DEVICE SERIAL_NUMBER BLADE................................................................................................... 48
SHOW INTERCONNECT SESSIONS ........................................................................................................ 48
Enclosure Bay IP Addressing commands ........................................................................................ 49
SET EBIPA ..............................................................................................................................................50
SHOW EBIPA......................................................................................................................................... 51
SET ALERTMAIL MAILBOX ........................................................................................................................ 62
SET ALERTMAIL SENDERDOMAIN ............................................................................................................ 62
SET ALERTMAIL SMTPSERVER ................................................................................................................... 63
SET OA GATEWAY................................................................................................................................. 63
SET OA NAME....................................................................................................................................... 63
SET OA UID ...........................................................................................................................................64
SET IPCONFIG .......................................................................................................................................64
SET NTP POLL......................................................................................................................................... 64
SET NTP PRIMARY................................................................................................................................... 65
SET NTP SECONDARY ............................................................................................................................65
SET SNMP CONTACT ............................................................................................................................. 65
SET SNMP COMMUNITY......................................................................................................................... 66
SET SNMP LOCATION ............................................................................................................................ 66
SHOW NETWORK ................................................................................................................................. 66
SHOW SNMP ........................................................................................................................................ 67
SHOW SSHFINGERPRINT........................................................................................................................ 68
SHOW SSHKEY...................................................................................................................................... 68
Contents 5
TEST ALERTMAIL ..................................................................................................................................... 69
TEST SNMP............................................................................................................................................ 69
RESTART OA .......................................................................................................................................... 71
SET DATE............................................................................................................................................... 71
SET DISPLAY EVENTS .............................................................................................................................. 72
SET ENCLOSURE ASSET .......................................................................................................................... 72
SET ENCLOSURE NAME.......................................................................................................................... 73
SET ENCLOSURE PART_ NUMBER ............................................................................................................ 73
SET ENCLOSURE PDU_TYPE..................................................................................................................... 73
SET ENCLOSURE SERIAL_NUMBER ........................................................................................................... 74
SET ENCLOSURE UID .............................................................................................................................. 74
SET LLF INTERVAL.................................................................................................................................... 74
SET OA USB........................................................................................................................................... 75
SET POWER MODE................................................................................................................................. 75
SET POWER LIMIT................................................................................................................................... 75
SET POWER SAVINGS ............................................................................................................................ 76
SET TIMEZONE....................................................................................................................................... 76
SHOW CONFIG .................................................................................................................................... 76
SHOW DATE ......................................................................................................................................... 79
SHOW DISPLAY EVENTS......................................................................................................................... 80
SHOW ENCLOSURE FAN ....................................................................................................................... 80
SHOW ENCLOSURE INFO ...................................................................................................................... 81
SHOW ENCLOSURE LCD ........................................................................................................................ 81
SHOW ENCLOSURE POWERSUPPLY_SUMMARY....................................................................................... 82
SHOW ENCLOSURE POWERSUPPLY ........................................................................................................ 83
SHOW ENCLOSURE STATUS................................................................................................................... 84
SHOW ENCLOSURE TEMP ...................................................................................................................... 84
SHOW FRU............................................................................................................................................ 85
SHOW OA ............................................................................................................................................ 87
SHOW OA CERTIFICATE......................................................................................................................... 87
SHOW OA INFO ...................................................................................................................................88
SHOW OA NETWORK ........................................................................................................................... 88
SHOW OA STATUS................................................................................................................................ 89
SHOW OA USB .....................................................................................................................................89
SHOW POWER...................................................................................................................................... 90
SHOW SYSLOG..................................................................................................................................... 90
SHOW SYSLOG OA............................................................................................................................... 91
SHOW VCMODE ................................................................................................................................... 92
REBOOT SERVER .................................................................................................................................... 97
SET NIC................................................................................................................................................. 97
SET SERVER BOOT.................................................................................................................................. 97
SET SERVER BOOT ONCE .......................................................................................................................98
SET SERVER POWERDELAY ...................................................................................................................... 98
SET SERVER UID...................................................................................................................................... 99
SHOW SERVER BOOT ............................................................................................................................ 99
SHOW SERVER INFO.............................................................................................................................. 99
SHOW SERVER LIST .............................................................................................................................. 102
SHOW SERVER NAMES........................................................................................................................ 102
SHOW SERVER PORT MAP.................................................................................................................... 103
SHOW SERVER POWERDELAY............................................................................................................... 103
SHOW SERVER STATUS ........................................................................................................................ 104
SHOW SERVER TEMP............................................................................................................................ 106
SHOW SYSLOG SERVER ....................................................................................................................... 106
The Onboard Administrator CLI can be accessed remotely through any Telnet or SSH session.
Telnet session
1. Open a command-line window from a network-connected client.
2. At the prompt, telnet to the IP address of the Onboard Administrator and press Enter.
For example, telnet 192.168.100.130, where the IP address is the address of your Onboard
Administrator.
3. Enter a valid user name and press Enter.
4. Enter a valid password and press Enter. The CLI command prompt displays.
5. Enter commands for the Onboard Administrator.
6. To terminate the remote access telnet session, enter Exit, Logout, or Quit at the CLI command
prompt.
SSH session
1. Start a SSH session to the Onboard Administrator using any SSH client application.
2. When prompted, enter the assigned IP address or DNS name of the Onboard Administrator and
press Enter.
3. Enter a valid user name and press Enter.
4. Enter a valid password and press Enter. The CLI command prompt displays.
5. Enter commands for the Onboard Administrator.
6. To terminate the remote access SSH session, close the communication software or enter Exit,
Logout, or Quit at the CLI command prompt.
Local access to the Onboard Administrator
The Onboard Administrator can be accessed locally through a serial port connector on the rear of the
Onboard Administrator module. Use a laptop or another computer as a serial console to communicate
with the Onboard Administrator. A laptop or PC connected to the Onboard Administrator serial port
requires a null-modem cable. The minimum connection to an external console is pins 2, 3, and 5.
1. Connect a serial cable between the serial port on the computer and the corresponding serial port on
the Onboard Administrator module. The following table is for the DB9 serial (RS232) port and shows
the pinout and signals for the RS232 connector. The signal direction is DTE (computer) relative to the
DCE (modem).
Pin Name Signal direction Description
1 CD <<-- Carrier detect
Accessing the command line interface 9
Pin Name Signal direction Description
2 RXD <<-- Receive data
3 TXD -->> Transmit data
4 DTR -->> Data terminal ready
5 GND
System ground
6 DSR <<-- Data set ready
7 RTS -->> Request to send
8 CTS <<-- Clear to send
9 RI <<-- Ring indicator
2. Use any standard communication software to launch a terminal emulation session with the following
3. When prompted, enter a valid user name, and then press Enter.
4. Enter a valid password, and press Enter. The CLI command prompt appears.
5. Enter commands for the Onboard Administrator.
6. To terminate the terminal session, enter Exit at the prompt.
Accessing the command line interface 10
Command line
Command line overview
The CLI can be used as an alternative method for managing the Onboard Administrator. Using the CLI
can be useful in the following scenarios:
• HP Management Applications (for example: Systems Insight Manager, Insight Control tools, and so
on) can query the Onboard Administrator for information these tools need to present a complete
management view of HP BladeSystem enclosures and the devices contained within. This interface is
also used by the Management tools to execute provisioning and configuration tasks to devices within
the enclosure.
• Users can develop tools that utilize Onboard Administrator functions for data collection and for
executing provisioning and configuration tasks.
• When no browser is available or you prefer to use a Linux command line interface to access
management data and perform configuration tasks.
Command line conventions
CLI input is case-insensitive except when otherwise noted. Commands are organized into a tree, with
approximately 30 base commands. Each of these commands can have any number of subcommands.
Subcommands can also have further subcommands.
Each command used in this guide follows the conventions listed in the following table.
Symbol Description
<lower case>
UPPER CASE
|
{ }
[ ]
Denotes the variable within the symbols that must be substituted with a value, such as
a user name. Symbols must be removed.
Denotes input to be entered as shown.
Unless noted, symbol is not case-sensitive.
Used to separate input options.
Denotes a list of mandatory choices that must be made.
For example, SET ENCLOSURE UID {ON | OFF} must be in the form of either of
the following:
• SET ENCLOSURE UID ON
• SET ENCLOSURE UID OFF
Denotes an optional argument or set of characters.
" "
Used to enclose command arguments that contain spaces.
Command line 11
HP Integrity server blade restrictions
HP Integrity server blades do not support all commands. See specific commands for restrictions on HP
Integrity server blades.
The following commands are not applicable to HP Integrity server blades
• Hponcfg
• Set Server Boot
• Set Server Boot Once
• Show Server Boot
• Show Syslog Server
• Update iLO
Access level and privileges
Onboard Administrator accounts and privileges
Onboard Administrator accounts are created with a username, password, privilege level, and permissions
to Device bays and Interconnect bays on the Onboard Administrator. You cannot delete or modify the
privileges of the default Administrator account, on the Onboard Administrator. You can only change the
password for the Administrator account. The following table indicates the capabilities of the user based
on their privileges and permitted bays.
Command line 12
Account classification Capabilities Account name /
Privilege level
Administrator
• All commands
• Local account, not
LDAP
Administrator /
administrator
• Only account
remaining after a
reset Onboard
Administrator to
factory defaults
(account retains
configured
Administrator
password)
• Administrator
account password
can be reset to
factory default
through the
Onboard
Administrator serial
port using "L" lost
password recovery
option
• Can download,
add, and clear
SSHKey. This key
only works with the
Administrator
account.
OA administrator
• All commands
username / administrator OA bays (all bays
• Allows access to all
aspects of the HP
BladeSystem
Enclosure and
Onboard
Administrator
including
configuration,
firmware updates,
user management,
and resetting default
settings.
Bays selected for this
account
All
automatically selected)
Command line 13
Account classification Capabilities Account name /
Privilege level
administrator
• Can perform all
operations to
permitted device
bays and
interconnect bays
including virtual
power and console
access
username / administrator No OA bays and only
Bays selected for this
account
selected device bays and
interconnect bays
• administrator
permission on device
iLO2
OA operator
• Set rack name
• EBIPA
enable/disable
permitted bays
username / operator OA bays and can have other
bays selected, but the
capabilities for the other
bays are defined in operator
• Change OA network
settings
• Perform enclosure
management
commands
operator
• Can perform all
operations to
permitted device
bays and
interconnect bays
including virtual
power and console
access
username / operator Selected device bays and
interconnect bays
• operator permission
on device iLO2
user
• Can view status and
information of
selected bays
username / user No OA bays and some
device bays and interconnect
bays
• Can view CLI history
• Can set password
for own account
• Can set user contact
information for own
account
• Can 'show' CLI
commands
Account authentication
Local users
Command line 14
• This is the default setting. Local user accounts are directly authenticated against a password for each
account stored on the active Onboard Administrator.
• Account modifications are automatically synchronized between both Onboard Administrator
modules if two are present.
• Local users may be disabled if LDAP is enabled, leaving the Administrator account as the only local
account that cannot be disabled.
LDAP users
• The Enable/Disable LDAP is an optional setting. LDAP enabled can be used with local users enabled
or disabled.
• The Onboard Administrator will use configured LDAP server and search context to request account
authentication.
• Configuration of the LDAP group will determine the privileges instead of the username.
• If a user is configured for multiple groups with different privileges and bay permissions, then the user
will have the highest privileges and the combination of all permitted bays.
• In version 2.10 or higher, if the user logged into the Onboard Administrator is an LDAP user then the
Onboard Administrator enforces the iLO2 license and requires that the iLO have a Select license
before allowing the AutoLogin to iLO.
AutoLogin to iLO 2
The following table indicates Onboard Administrator account privileges mapped to iLO 2 privileges when
using Onboard Administrator AutoLogin.
iLO 2 privileges administrator operator user
Administer user accounts X
Remote console access X X
Virtual power and reset X X
Virtual media X X
Configure iLO 2 settings X
Login to iLO X X X
Command line 15
General commands
CLEAR SCREEN
•Command:
CLEAR SCREEN
•Description:
Clears the terminal screen
•Access level:
EXIT
• Command:
• Description:
• Access level:
HELP
• Command:
• Description:
Administrator, Operator, User
EXIT
Exits the command line interpreter
Administrator, Operator, User
HELP <command>
If you supply a command, the usage and help text for the command appears. If no argument is
given, all base commands appear.
•Access level:
Administrator, Operator, User
Example
OA-0018FE27577F> HELP
ADD | ASSIGN | CLEAR | CONNECT | DISABLE | DOWNLOAD | ENABLE | EXIT | FORCE | GENERATE |
HELP | HISTORY | HPONCFG | LOGOUT | PING | POWEROFF | POWERON | QUIT | REBOOT | REMOVE |
RESET | RESTART | SET | SHOW | SLEEP | TEST | UNASSIGN | UPDATE | UPLOAD
General commands 16
LOGOUT
•Command:
LOGOUT
•Description:
Exits the command line interpreter
• Access level:
QUIT
• Command:
• Description:
• Access level:
Administrator, Operator, User
QUIT
Exits the command line interpreter
Administrator, Operator, User
General commands 17
Rack commands
SET RACK NAME
•Command:
SET RACK NAME <rack name>
•Description:
Sets the rack name
•Access level/Bay level:
OA administrator, OA operator
•Restrictions:
The <rack name> must be a maximum of 32 characters long and includes all alphanumeric, the
dash, and the underscore characters.
UnnamedRack is the default rack name.
SHOW RACK NAME
•Command:
SHOW RACK NAME
•Description:
Displays the user defined rack name setting for the enclosure
•Access level/Bay level:
All
•Restrictions:
None
•Example:
OA-0018FE27577F> SHOW RACK NAME
Rack Name: UnnamedRack
SHOW TOPOLOGY
•Command:
SHOW TOPOLOGY
•Description:
o Displays the enclosures connected by the enclosure link
o Displays a table with the enclosure name, overall health of the enclosure, and the IP address
Rack commands 18
•Access level/Bay level
All
•Restrictions:
None
Example
SHOW TOPOLOGY
Detecting linked enclosures ....
Rack Topology (top-down)
Rack UUID: 090987654321
Rack Name: UnnamedRack
Enclosure Name Status Local IP Address UUID
-------------------------------- -------- ----- --------------- ------------Shorty OK Yes 16.84.190.253 090987654321
OA-0018FE2F998B OK No 172.16.211.101 09USE644285C
Rack commands 19
User account commands
ADD USER
•Command:
ADD USER "<user name>" ["<password>"]
•Description:
Adds a user to the system. If you do not provide a password, you are prompted for one. If SCRIPT
MODE is enabled and the password is not provided, the password is assigned an unmatched string.
This unmatched string requires an enclosure administrator to change the password to allow the new
user to access the system.
•Access level/Bay level:
OA administrator
•Restrictions:
o You can add a maximum of 30 users, including the reserved accounts.
o The <user name> is case sensitive and must be unique to all other user names and group names.
o The <user name> must begin with a letter.
o The <password> must be three to eight characters long for firmware 1.00 through 1.30 and 3 to
o Reserved user names are: ALL (case insensitive) ADMINISTRATOR (case insensitive), switch1,
ASSIGN
•Command:
ASSIGN {SERVER | INTERCONNECT} {<bay number> | ALL | <bay number>-<bay
number>} {"<user name>" | LDAP GROUP "<LDAP group name>"}
•Description:
Assigns one or more bays to a user or group
The <user name> must be 1 to 40 characters long and can include all alphanumeric characters,
the dash, and the underscore.
40 characters long for firmware 2.00 and later. The character set includes all printable
characters. If you do not enter a password, you are prompted to enter one.
switch2, switch3, switch4, switch5, switch6, switch7, switch8, ldapuser, nobody, vcmuser,
vcmuser_, and root (for firmware 1.00 through 1.30).
•Access level/Bay level:
OA administrator
•Restrictions:
The <user name> is case sensitive. If a bay is presently assigned to a user, you must unassign the
bay first.
User account commands 20
ASSIGN OA
•Command:
ASSIGN OA {"<user name>" | LDAP GROUP "<LDAP group name>"}
• Description:
Assigns the Onboard Administrators specified to an existing user or group
•Access level/Bay level:
OA administrator
• Restrictions:
The <user name> is case sensitive.
DISABLE USER
•Command:
DISABLE USER "<user name>"
•Description:
Disables a user account. The system immediately logs out the user and prevents the user from
logging in until the account is enabled. CLI sessions are terminated and all future SOAP web
accesses fail.
•Access level/Bay level:
OA administrator
•Restrictions:
o The <user name> is case sensitive.
o You cannot disable the built-in Administrator account
DISABLE STRONG PASSWORDS
•Command:
DISABLE STRONG PASSWORDS
•Description:
Removes strong password requirements for user passwords
•Access level/Bay level:
OA administrator
•Restrictions:
Only Administrators with Onboard Administrator permission are allowed to manage strong
passwords.
ENABLE STRONG PASSWORDS
• Command:
User account commands 21
ENABLE STRONG PASSWORDS
•Description:
When enabled, this command requires that a user's password contain at least one character from
three of the four categories.
The four categories include:
o Uppercase
o Lowercase
o Numeric
o Nonalphanumeric
•Access level/Bay level:
OA administrator
• Restrictions:
Only Administrators with Onboard Administrator permission are allowed to manage strong
passwords
ENABLE USER
•Command:
ENABLE USER "<user name>"
•Description:
Enables a user account that was previously disabled by the DISABLE USER command
•Access level/Bay level:
OA administrator
•Restrictions:
The <user name> is case sensitive.
HISTORY
•Command:
HISTORY
•Description:
Shows the history of commands for the current session
•Access level/Bay level:
All
•Restrictions:
None
REMOVE USER
•Command:
User account commands 22
REMOVE USER {ALL | "<user name>" | CERTIFICATE "<user name>"}
•Description:
Removes a user from the system and/or any certificate mapped to the user. If you specify ALL, then
the command is run for all users except the default system accounts.
•Access level/Bay level:
OA administrator
•Restrictions:
o The <user name> is case sensitive.
o You cannot remove the Administrator account.
SET MINIMUM PASSWORD LENGTH
•Command:
SET MINIMUM PASSWORD LENGTH <length>
•Description:
Sets a minimum length for passwords. When set, a user's password must contain at least the number
of characters specified.
•Access level/Bay level:
OA administrator
• Restrictions:
The minimum password length can be set between 3 and 40 characters.
SET PASSWORD
•Command:
SET PASSWORD ["<password>"]
•Description:
Sets the password of the user that executed the command. If you do not provide a password on the
command line, you are prompted for one.
•Access level/Bay level:
All
•Restriction:
The <password> must be three to eight characters long for firmware 1.00 through 1.30 and 3 to 40
characters long for firmware 2.00 and later. The character set includes all printable characters.
SET SESSION TIMEOUT
•Command:
SET SESSION TIMEOUT <timeout>
•Description:
Sets the number of minutes before inactive sessions are removed. The default setting is 1440.
User account commands 23
•Access level/ Bay level:
OA administrator
•Restriction:
Valid session timeout values range from 10 to 1440 minutes (24 hours).
SET USER ACCESS
•Command:
SET USER ACCESS "<user name>" {ADMINISTRATOR | OPERATOR | USER}
•Description:
Sets the user access level. Additionally, use the ASSIGN command to give the user access rights to
the Onboard Administrator, server bays, and interconnect bays.
•Access level/Bay level:
OA administrator
•Restrictions:
None
SET USER CONTACT
•Command:
SET USER CONTACT ["<user name>"] "<contact info>"
•Description:
Sets the contact information field for the user. If there is no <user name>, the command modifies the
contact information of the user who executed the command.
•Access level/Bay level:
o All users can modify their own contact information.
o The OA administrator can modify all users.
•Restrictions:
o The <user name> is case sensitive. The <contact info> must be a maximum of 20 characters long
and includes all alphanumeric characters, the dash, the underscore, and spaces.
o The default contact information is blank.
o You must use double quotes if the contact information contains any spaces.
SET USER FULLNAME
•Command:
SET USER FULLNAME ["<user name>"] "<full name>"
•Description:
Sets a user's full name. If you do not specify a <user name>, the command modifies the full name of
the user who is currently logged in.
•Access level/Bay level:
User account commands 24
o
OA administrator, OA operator
o All users can modify their own full name.
•Restrictions:
o The <user name> is case sensitive. The <full name> must be a maximum of 20 characters long
and includes all alphanumeric, the dash, the underscore, and the space characters.
o The default full name is blank.
SET USER PASSWORD
•Command:
SET USER PASSWORD "<user name>" ["<new password>"]
•Description:
Sets a user's password. If you do not supply a password on the command line, you are prompted for
one.
•Access level/Bay level
OA administrator
OA operator and User access level users can change their own passwords.
•Restrictions:
o Only OA administrators can modify another user's password. Only the Administrator account
can modify the password of the Administrator account.
o The <user name> is case sensitive.
o The <new password> must be three to eight characters long for firmware 1.00 through 1.30 and
3 to 40 characters long for firmware 2.00 and higher.
o The character set includes all printable characters.
o This command is not valid in SCRIPT MODE.
SHOW PASSWORD SETTINGS
•Command:
SHOW PASSWORD SETTINGS
•Description:
Displays the current minimum password length and strong password settings
Displays the user's full name, contact information, whether the user has administrator rights, whether
the account is enabled, the access level, whether the user has access to the Onboard Administrator,
and the bays the user can access.
If you enter LIST and you are an OA administrator, the information for every user is listed. An
asterisk before a user name denotes the current user.
•Access level/Bay level:
All
•Restrictions:
The <user name> is case sensitive. Users who do not have OA administrator or OA operator access
levels can only view their user information.
Example
OA-0018FE27577F> SHOW USER
Local User "Administrator" Information:
Full name: System Administrator
Contact Info:
User Rights: Admin
Account Status: Enabled
Server Bay Access List: 1 1A 1B 2 2A 2B 3 3A 3B 4 4A 4B 5 5A 5B 6 6A 6B
7 7A 7B 8 8A 8B
Interconnect Bay Access List: 1 2 3 4
OA Access: Yes
User account commands 26
SLEEP
• Command:
• Description:
• Access level/Bay level:
• Restrictions:
SLEEP <seconds>
Pauses the sessions for a fixed period of time. This command is useful for adding delays to scripts.
After the pause has started, you cannot continue the session before time runs out. However, you can
terminate the session and start another session.
All
The <seconds> field must be a whole number from 1 to 86400.
UNASSIGN
•Command:
UNASSIGN {SERVER | INTERCONNECT} {<bay number> | ALL | <bay number>-<bay
number>} {"<user name>" | LDAP GROUP "<LDAP group name>"}
•Description:
Removes a bay from the user
•Access level/Bay level:
OA administrator
•Restrictions:
The <user name> is case sensitive.
UNASSIGN OA
•Command:
UNASSIGN OA {"<user name>" | LDAP GROUP "<LDAP group name>"}
•Description:
Removes the Onboard Administrator from the control of the user that it is currently assigned
•Access level/Bay level:
OA administrator
•Restrictions:
The <user name> is case sensitive.
User account commands 27
Two-Factor Authentication commands
DISABLE CRL
•Command:
DISABLE CRL
•Description:
Disables certificate revocation checks
•Access level/Bay level:
OA administrator
•Restrictions:
None
DISABLE TWOFACTOR
•Command:
DISABLE TWOFACTOR
•Description:
Disables Two-Factor Authentication
•Access level/Bay level:
OA administrator
•Restrictions:
None
DOWNLOAD CA CERTIFICATE
•Command:
DOWNLOAD CA CERTIFICATE "<url>"
•Description:
Downloads a CA certificate to act as the trusted certification authority to validate user certificates
when using Two-Factor Authentication.
•Access level/Bay level:
OA administrator
•Restrictions:
Allows the download of up to five different certificates
Two-Factor Authentication commands 28
DOWNLOAD USER CERTIFICATE
•Command:
DOWNLOAD USER CERTIFICATE "<user name>" <url>
• Description:
o Downloads an x.509 certificate for the user from <url>. The file at <url> must be a Base64 PEM
encoded file.
o Downloads a CA certificate used in Two-Factor Authentication
•Access level/Bay level:
OA administrator
• Restrictions:
None
REMOVE CA CERTIFICATE
•Command:
REMOVE CA CERTIFICATE "<certificate name>"
• Description:
• Removes the trust certificate corresponding to the SHA1 <certificate name>. Any users having their
certificates issued by this CA can no longer login if Two-Factor Authentication is enabled.
•Access level/Bay level:
OA administrator
•Restrictions:
None
REMOVE USER CERTIFICATE
•Command:
REMOVE USER CERTIFICATE "<user name>"
•Description:
Removes the user certificate. If Two-Factor Authentication is enabled, this user no longer has access
through HTTPS.
•Access level/Bay level:
OA administrator
•Restrictions:
None
SHOW CA CERTIFICATES
•Command:
Two-Factor Authentication commands 29
SHOW CA CERTIFICATES
•Description:
Displays a list of installed CA certificates
•Access level/Bay level:
All
•Restrictions:
None
Example
OA-0016355E560A> SHOW CA CERTIFICATE
Details for ca certificate 1
certificateVersion = 3
issuerOrganization = ca.com
issuerOrganizationalUnit = IT Infrastructure
issuerCommonName = Hewlett-Packard Primary Class 2 Certification Authority
subjectOrganization = hp.com
subjectOrganizationalUnit = IT Infrastructure
subjectCommonName = Hewlett-Packard Primary Class 2 Certification Authority
validFrom = 1997-12-30T00:00:00Z
validTo = 2012-12-29T23:59:59Z
serialNumber =83:B7:1B:E9:27:AB:5C:61:F8:8F:90:30:E:0D:17:DE:C6
extensionCount = 7
md5Fingerprint = B6:22:5B:B8:43:CD:1A:66:64:19:33:B:3:C1:80:BF:B6
sha1Fingerprint = CF:5C:89:7B:84:7B:73:C4:C5:3E:3F:E:7:93:09:53:EB:C4:28:BE:CF
SHOW TWOFACTOR INFO
•Command:
SHOW TWOFACTOR INFO
• Description:
Displays the configuration details for Two-Factor Authentication
•Access level/Bay level:
OA administrator
•Restrictions:
None
Example
OA-0018FE27577F> SHOW TWOFACTOR INFO
Two Factor Authentication:
Enabled : Disabled
Certificate Revocation : Disabled
Certificate Owner Field : Subject
Two-Factor Authentication commands 30
Loading...
+ 113 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.